Book Image

iOS Forensics Cookbook

By : Birani
Book Image

iOS Forensics Cookbook

By: Birani

Overview of this book

Mobile device forensics is a branch of digital forensics that involves the recovery of evidence or data in a digital format from a device without affecting its integrity. With the growing popularity of iOS-based Apple devices, iOS forensics has developed immense importance. To cater to the need, this book deals with tasks such as the encryption and decryption of files, various ways to integrate techniques withsocial media, and ways to grab the user events and actions on the iOS app. Using practical examples, we’ll start with the analysis keychain and raw disk decryption, social media integration, and getting accustomed to analytics tools. You’ll also learn how to distribute the iOS apps without releasing them to Apple’s App Store. Moving on, the book covers test flights and hockey app integration, the crash reporting system, recovery tools, and their features. By the end of the book, using the aforementioned techniques, you will be able to successfully analyze iOS-based devices forensically.
Table of Contents (9 chapters)

Preface

This book focuses on the various techniques for acquisition, identification, and forensic analysis of iOS devices. This is a step-by-step practical guide that will help you to follow the procedure and extract data from iOS devices. This book helps professionals to investigate and understand forensic scenarios easily. This is a practical guide written after the rising popularity of iOS devices and the growing investigation requirements. This book deals with the various ways to investigate devices with different iOS versions and the presence and absence of other security systems such as lock code, backup passwords, and so on.

Conceptually, this book can be divided into three sections. The first section deals with the understanding of how data is generated by applications and how and where it is stored on the device. The second section focuses mainly on various analytic techniques, which include the analytics of apps by reading their logs and reports provided by Apple and other third-party vendors. This also includes the analysis and other related data mining studies provided by Google and Crashlytics. The third section, that is, the last section of the book, deals with a study, in detail, of various core forensics, which include the data structure and organization of files. This also includes the study of various open source tools that allow the detail decrypting techniques performed on any iOS device.